App comparison

Add up to 4 apps below to see how they compare. You can also use the "Compare" buttons while browsing.

GetApp offers objective, independent research and verified user reviews. We may earn a referral fee when you visit a vendor through our links. Learn more

GoodAccess vs Jamf Protect Comparison

Add to Compare

Compare similar apps

NordVPN logo

NordVPN

4.6

ExpressVPN logo

ExpressVPN

4.6

Intercept X Endpoint logo

Intercept X Endpoint

4.5

Perimeter 81 logo

Perimeter 81

4.8

Falcon logo

Falcon

4.7

Hack The Box logo

Hack The Box

4.9

Good recommendations?

Overview

Category Leaders

GoodAccess is a cloud VPN that helps remote teams to securely access business systems, cloud apps and other resources. In...

Category Leaders

Jamf Protect is an endpoint protection software designed to help businesses monitor events across Mac devices and detect,...

  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials
  • Platforms supported
  • Web-based
  • iPhone app
  • Android app
  • Windows Phone app
  • Typical customers
  • Freelancers
  • Small businesses
  • Mid size businesses
  • Large enterprises
  • Customer support
  • Phone
  • Online
  • Knowledge base
  • Video tutorials

Video & Screenshots

No videos yet

Pricing

Starting from

7

/user

Per month

  • Free trial available
  • Credit cardless trial
  • Free account
  • Subscription based

Starting from

5

Per month

  • Free trial available
  • Credit cardless trial
  • Free account
  • Subscription based

User reviews

4.9

95

5

4

3

2

1

86

8

1

0

0

  • Value for money
  • Ease of use
  • Features
  • Customer support
100%
would recommend this app

4.5

35

5

4

3

2

1

21

11

2

0

1

  • Value for money
  • Ease of use
  • Features
  • Customer support
97%
would recommend this app

Pros

Great customer service, reliable and simple to use. Their system is much simpler to set up then the other companies I had tried and perfect for what our company needs are.
Super easy in use, fast setup and integration, convenient admin panel, high-speed and secure connection, friendly and helpful customer service, reasonable pricing.
Static vpn which is very useful for me. Very good service and I am very satisfied.

Pros

With that said, the integration is amazing. I love the ease of deployment.
I like the direct integration with JAMF pro. The system is very great to allow me insight in to the individual users.
Jamf Protect is great for both home and business and it becomes even better when you use Jamf Protect to set up a virtual private network (VPN).

Cons

The Customer service is not 24/7 I guess. I need to wait 12 hours for a representative to respond when I had a little problem.
We have more positive experiences than negative. We had a problem whitelisting our CRM, but the GoodAccess guru helped us really fast.
The only thing I don't like about the profiles generated, is that they don't come with auto login.

Cons

Often times they will update the threats themselves.
There have been a few features that have been missing for a long time. For example, renaming a device using user info during deployment.
Problems navigating some menus. Sometimes it seems to be problematic.
  • Vendor responds to reviews
  • Last review3 months ago
  • Vendor responds to reviews
  • Last review9 days ago

Key features

  • Total features122
  • AI/Machine Learning
  • API
  • Access Certification
  • Access Controls/Permissions
  • Access Management
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Ad Blocker
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anonymous Browsing
  • Anti Virus
  • Application Access Control
  • Application Management
  • Application Security
  • Audit Management
  • Audit Trail
  • Authentication
  • Behavior Analytics
  • Behavior Tracking
  • Behavioral Analytics
  • Chat/Messaging
  • Cloud Application Security
  • Cloud Encryption
  • Cloud Security Policy Management
  • Compliance Management
  • Configuration Management
  • Content Filtering
  • Credential Management
  • Customizable Reports
  • DNS Leak Protection
  • Dashboard
  • Dashboard Creation
  • Data Import/Export
  • Data Loss Prevention
  • Data Security
  • Data Visualization
  • Device Management
  • Employee Activity Monitoring
  • Encryption
  • Endpoint Management
  • Endpoint Protection
  • Event Analysis
  • Event Logs
  • Filtering
  • Firewalls
  • For MSPs
  • Geo-spoofing
  • HIPAA Compliant
  • IP Filtering
  • IP Masking
  • IT Incident Management
  • IT Reporting
  • Incident Management
  • Incident Reporting
  • Insider Threat Protection
  • Intrusion Detection System
  • Inventory Management
  • Issue Auditing
  • Live Chat
  • Log Access
  • Member Accounts
  • Mobile Access
  • Monitoring
  • Multi-Device Support
  • Multi-Factor Authentication
  • Multi-Language
  • Multi-Protocol
  • Multiple User Accounts
  • Network Monitoring
  • Network Provisioning
  • Network Security
  • Next-Generation Firewall
  • No-log VPN
  • Patch Management
  • Policy Management
  • Privileged Account Management
  • Ransomware Protection
  • Real-Time Monitoring
  • Remediation Management
  • Remote Access Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Remote Support
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Role-Based Permissions
  • Rules-Based Workflow
  • SSL Security
  • Search/Filter
  • Secure Browsing
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Security Breach Monitoring
  • Security Tools
  • Self Service Portal
  • Server Monitoring
  • Single Sign On
  • Spam Blocker
  • Status Tracking
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • Uptime Reporting
  • Usage Tracking/Analytics
  • User Activity Monitoring
  • User Management
  • User Provisioning
  • User Session Management
  • VPN
  • VPN Tunneling
  • Visual Analytics
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Inspection
  • Web Threat Management
  • Web Traffic Reporting
  • Web-Application Security
  • Whitelisting/Blacklisting
  • Total features23
  • AI/Machine Learning
  • API
  • Access Certification
  • Access Controls/Permissions
  • Access Management
  • Activity Dashboard
  • Activity Monitoring
  • Activity Tracking
  • Ad Blocker
  • Alerts/Escalation
  • Alerts/Notifications
  • Anomaly/Malware Detection
  • Anonymous Browsing
  • Anti Virus
  • Application Access Control
  • Application Management
  • Application Security
  • Audit Management
  • Audit Trail
  • Authentication
  • Behavior Analytics
  • Behavior Tracking
  • Behavioral Analytics
  • Chat/Messaging
  • Cloud Application Security
  • Cloud Encryption
  • Cloud Security Policy Management
  • Compliance Management
  • Configuration Management
  • Content Filtering
  • Credential Management
  • Customizable Reports
  • DNS Leak Protection
  • Dashboard
  • Dashboard Creation
  • Data Import/Export
  • Data Loss Prevention
  • Data Security
  • Data Visualization
  • Device Management
  • Employee Activity Monitoring
  • Encryption
  • Endpoint Management
  • Endpoint Protection
  • Event Analysis
  • Event Logs
  • Filtering
  • Firewalls
  • For MSPs
  • Geo-spoofing
  • HIPAA Compliant
  • IP Filtering
  • IP Masking
  • IT Incident Management
  • IT Reporting
  • Incident Management
  • Incident Reporting
  • Insider Threat Protection
  • Intrusion Detection System
  • Inventory Management
  • Issue Auditing
  • Live Chat
  • Log Access
  • Member Accounts
  • Mobile Access
  • Monitoring
  • Multi-Device Support
  • Multi-Factor Authentication
  • Multi-Language
  • Multi-Protocol
  • Multiple User Accounts
  • Network Monitoring
  • Network Provisioning
  • Network Security
  • Next-Generation Firewall
  • No-log VPN
  • Patch Management
  • Policy Management
  • Privileged Account Management
  • Ransomware Protection
  • Real-Time Monitoring
  • Remediation Management
  • Remote Access Management
  • Remote Access/Control
  • Remote Monitoring & Management
  • Remote Support
  • Reporting & Statistics
  • Reporting/Analytics
  • Risk Alerts
  • Risk Analysis
  • Risk Assessment
  • Role-Based Permissions
  • Rules-Based Workflow
  • SSL Security
  • Search/Filter
  • Secure Browsing
  • Secure Data Storage
  • Secure Login
  • Security Auditing
  • Security Breach Monitoring
  • Security Tools
  • Self Service Portal
  • Server Monitoring
  • Single Sign On
  • Spam Blocker
  • Status Tracking
  • Third-Party Integrations
  • Threat Intelligence
  • Threat Response
  • Two-Factor Authentication
  • Uptime Reporting
  • Usage Tracking/Analytics
  • User Activity Monitoring
  • User Management
  • User Provisioning
  • User Session Management
  • VPN
  • VPN Tunneling
  • Visual Analytics
  • Vulnerability Protection
  • Vulnerability Scanning
  • Web Inspection
  • Web Threat Management
  • Web Traffic Reporting
  • Web-Application Security
  • Whitelisting/Blacklisting

Integrations

  • Total integrations4
  • Bitbucket
  • Datadog
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Drive
  • HubSpot CRM
  • Jenkins
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Teams
  • NetSuite
  • PagerDuty
  • ServiceNow
  • Shopify
  • Slack
  • Trello
  • Zapier
  • Zendesk Suite
  • Total integrations5
  • Bitbucket
  • Datadog
  • Dropbox Business
  • GitHub
  • GitLab
  • Google Drive
  • HubSpot CRM
  • Jenkins
  • Jira
  • Microsoft 365
  • Microsoft Azure
  • Microsoft Teams
  • NetSuite
  • PagerDuty
  • ServiceNow
  • Shopify
  • Slack
  • Trello
  • Zapier
  • Zendesk Suite